메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1723-1727

A double authentication scheme to detect impersonation attack in link state routing protocols

Author keywords

Double Authentication (DA); Impersonation Attack; Insider Attack; Link State Routing

Indexed keywords

DATA REDUCTION; PACKET NETWORKS; ROUTERS;

EID: 0038308135     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 1
    • 0034475589 scopus 로고    scopus 로고
    • Hierchical networks and the LSA N-squared problem in OSPF routing
    • A. V. Aho and D. Lee. "Hierchical Networks and the LSA N-Squared Problem in OSPF Routing", IEEE GlobeCom, 2000.
    • (2000) IEEE GlobeCom
    • Aho, A.V.1    Lee, D.2
  • 3
    • 0038735909 scopus 로고    scopus 로고
    • On providing confidentiality in network routing
    • October
    • D. Huang, A. Sinha and D.Medhi, "On Providing Confidentiality in Network Routing", "Technique Report, University Missouri Kansas City, October 2002. Available from http://conrel.sice.umkc.edu/HRP/.
    • (2002) Technique Report
    • Huang, D.1    Sinha, A.2    Medhi, D.3
  • 4
    • 0038735880 scopus 로고    scopus 로고
    • A flat group keying scheme to support 'any to any' secure subgroup communication
    • October
    • D. Huang and D. Medhi, "A Flat Group Keying Scheme to Support 'Any to Any' Secure Subgroup Communication", technical report, University Missouri Kansas City, October 2002. Available from http: //conrel.sice.umkc.edu/HRP/.
    • (2002) Technical Report
    • Huang, D.1    Medhi, D.2
  • 5
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • February
    • H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC2104, February 1997.
    • (1997) RFC2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 6
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. Lenstra and E. Verheul, "Selecting Cryptographic Key Sizes", Journal of Cryptology, 14(4): 255-293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2
  • 7
    • 0008971684 scopus 로고    scopus 로고
    • OSPF protocol analysis
    • J. Moy, "OSPF Protocol Analysis", RFC1245.
    • RFC1245
    • Moy, J.1
  • 8
    • 0003276078 scopus 로고    scopus 로고
    • OSPF version 2
    • April
    • J. Moy, "OSPF version 2", RFC2328, April 1998.
    • (1998) RFC2328
    • Moy, J.1
  • 11
    • 0038059501 scopus 로고
    • Security Estimates for 512-bit RSA
    • RSA Laboratories, June 29
    • M. Robshaw, "Security Estimates for 512-bit RSA", Technical Notes and Reports, RSA Laboratories, June 29, 1995
    • (1995) Technical Notes and Reports
    • Robshaw, M.1
  • 15
    • 0038735913 scopus 로고    scopus 로고
    • http://download.baltimore.com/keytools/docs/v51/pro/j-docs/html/devguide/projdev cruide-C.3.html
  • 16
    • 0038735911 scopus 로고    scopus 로고
    • http://www.cisco.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.